Facetime and Privacy: The REAL Risks

Ring, ring.

No answer.  

That's not a problem, I will just listen in on the other user without their permission.  REALLY? 

Yes, really.  Although by the time you read this, the "facetime bug" will have been fixed, it does highlight some real problems with high complexity technology.  They put your privacy at risk.  Audio and video feed to others without your permission ARE possible.  

The Apple "Facetime bug" Fix

While this current bug is being fixed by Apple, there are two major questions that remain, in regards to your personal privacy.

1. What other bugs are out there that we, the general public, don't know about but others' do?  Others that are looking to exploit those bugs for any number of reasons.

2. If this is possible by a "bug", what is possible when it's programmed in intentionally?  Who has the keys (i.e. knowledge) to use your phone or computers video camera and microphone without your permission?

 From a risk management standpoint what can be done?  Here at WCRM, we have a few ideas that can potentially help you stay safer.  (Note that I said safer, not safe).  These are simple, reasonable effective and nearly free.  

Privacy Safeguards

  1. ALWAYS assume that someone is listening or watching you over your phone.  Creepy, yes?  But more creepy is if someone IS monitoring you and you are unaware of it.
  2. Put a small piece of masking tape over every lens on every device you have.  Phone-front and back; Computer and other items.  To my knowledge, software has not yet been able to read images through masking tape.  
  3. Assume the microphone is live all the time.  Don't want to be overheard?  Put your phone in another room, or under some sound muffling material.  In your pocket.  Anything to help reduce the listening capabilities of your phone.  

When at home or at the office, you may want to have a small decorative box that is readily available.  You can put your phone into the box and it will block the video and, if properly insulated, can muffle the ability to listen in on your conversations.  

Block Your Cell Phone's Connection and Boost Security

Want more protection?  Then consider that same box, but be sure it's metallic (ferrous I believe is required).  Line the box with some insulator (I have used a thin sheet of cork), so your phone can't touch the metal box.  You have just made a small Faraday cage and your phone will be unable to communicate with your service network.  Now THAT's protection. Want to test it?   Put your phone in the box, pop on the top, and then call the phone number.  If the Faraday cage is complete and effective, it won't ring because it's not connected to the network.  No signals can get to your phone because of the electromagnetic blocking.  When your phone doesn't ring, you know your Faraday box has done its job. 

Two downsides to this technique are that you won't be able to receive calls when your phone is in the box and because your phone will be trying to reach the network, it may cause drain on your battery.

As with all new technologies and developments, there are downsides.  We can either elect to NOT use them or be aware of potential sources of risk in their use. By being aware and taking some simple safeguards we can often counteract the risks of their use. It's no different than dealing with any other source of risk in your life. 

Remember WCRM's program: "A. R. P."

Assess the risk

Reduce the risk

Protect yourself against any residual risk. 


 WhiteCoat Risk Management provides these articles to help improve general risk awareness in all aspects of your life.  It is not responsible for any actions you take or fail to take regarding any aspect of your financial planning or risk management.  This article is provided for information purposes and is not intended to provide individualized advice. You alone are responsible for your financial decisions.  

Visit or contact WhiteCoat Risk Management at www.WhiteCoatRiskManagement.com or join us on Facebook at https://www.facebook.com/WhiteCoatRisk/ 

Close

50% Complete

Just one more thing to do...

Thanks for your interest.  Once you enter your first name and email, be sure to check your email and complete your opt-in.  While you are at it, be sure to "white list" emails from WhiteCoatRiskManagement.com  

Thanks!

Why do we do a double opt-in?  Because we want to provide you with that extra degree of security.